The collection of potentially actionable, overt, and publicly available information is known as

The collection of potentially actionable, overt, and publicly available information is known asA . Open-source intelligenceB . Human intelligenceC . Social intelligenceD . Real intelligenceView AnswerAnswer: A

October 16, 2020 No Comments READ MORE +

Which of the following is the best countermeasure to encrypting ransomwares?

Which of the following is the best countermeasure to encrypting ransomwares?A . Use multiple antivirus softwaresB . Keep some generation of off-line backupC . Analyze the ransomware to get decryption key of encrypted dataD . Pay a ransomView AnswerAnswer: B

October 16, 2020 No Comments READ MORE +

What is the name of this technique to hide the code and extend analysis time?

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. What is the name...

October 16, 2020 No Comments READ MORE +

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; --‘; which type of SQL injection attack is the attacker performing?

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; --‘; which type of SQL injection attack is the attacker performing?A . End of Line CommentB . UNION SQL InjectionC . Illegal/Logically Incorrect QueryD . TautologyView AnswerAnswer: D

October 15, 2020 No Comments READ MORE +

In Wireshark, the packet bytes panes show the data of the current packet in which format?

In Wireshark, the packet bytes panes show the data of the current packet in which format?A . DecimalB . ASCII onlyC . BinaryD . HexadecimalView AnswerAnswer: D

October 15, 2020 No Comments READ MORE +

What type of method is Sam using to evade IDS?

Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide...

October 15, 2020 No Comments READ MORE +

What is the main security risk associated with this scenario?

Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it....

October 15, 2020 No Comments READ MORE +

Which of the following program infects the system boot sector and the executable files at the same time?

Which of the following program infects the system boot sector and the executable files at the same time?A . Stealth virusB . Polymorphic virusC . Macro virusD . Multipartite VirusView AnswerAnswer: D

October 15, 2020 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

October 15, 2020 No Comments READ MORE +

Which type of virus detection method did Chandler use in this context?

Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler...

October 15, 2020 No Comments READ MORE +